لا تريد أن تفوت شيئا؟

نصائح اجتياز امتحان الشهادة

آخر أخبار الامتحانات ومعلومات الخصم

برعاية وحديثة من قبل خبرائنا

نعم، أرسل لي النشرة الإخبارية

خذ اختبارات أخرى عبر الإنترنت

السؤال #1
Scenario: A Citrix Architect has set up NetScaler MPX devices in high availability mode with version 12.0. 53.13 nc. These are placed behind a Cisco ASA 5505 Firewall is configured to block traffic using access control lists. The network address translation (NAT) is also performed on the firewall. The following requirements were captured by the architect during the discussion held as part of the NetScaler security implementation project with the customer’s security team: The NetScaler device: Should monitor
A. Pattern sets
B. Rate limiting
C. HTTP DDOS
D. Data sets
E. APPQOE
عرض الإجابة
اجابة صحيحة: BE
السؤال #2
Scenario: A Citrix Architect needs to configure a full VPN session profile to meet the following requirements: Users should be able to send the traffic only for the allowed networks through the VPN tunnel. Only the DNS requests ending with the configured DNS suffix workspacelab.com must be sent to NetScaler Gateway. If the DNS query does NOT contain a domain name, then DNS requests must be sent to NetScaler gateway. Which settings will meet these requirements?
A. Split Tunnel to OFF, Split DNS Both
B. Split Tunnel to ON, Split DNS Local
C. Split Tunnel to OFF, Split DNS Remote
D. Split Tunnel to ON, Split DNS Remote
عرض الإجابة
اجابة صحيحة: B
السؤال #3
Scenario: A Citrix Architect needs to design a new multi-datacenter NetScaler deployment. The customer wants NetScaler to provide access to various backend resources by using Global Server Load Balancing (GSLB) in an Active-Active deployment. Click the Exhibit button to view additional requirements identified by the architect. Which GSLB algorithm or method should the architect use for the deployment, based on the stated requirements?
A. Dynamic round trip time (RTT)
B. Least response time
C. Static proximity
D. least connection
E. Least packets
F. Source IP hash
عرض الإجابة
اجابة صحيحة: B
السؤال #4
Scenario: A Citrix Architect needs to assess an existing NetScaler configuration. The customer recently found that members of certain administrator groups were receiving permissions on the production NetScaler appliances that do NOT align with the designed security requirements. Click the Exhibit button to view the configured command policies for the production NetScaler deployment. To align the command policy configuration with the security requirements of the organization, the _______ for ______should cha
A. command spec; item 3
B. priority; Item 5
C. action; Item 1
D. priority; Item 2
E. action; Item 4
F. command spec; Item 6
عرض الإجابة
اجابة صحيحة: D
السؤال #5
Scenario: A Citrix Architect has met with a team of Workspacelab members for a design discussion. They have captured the following requirements for NetScaler design project: The authentication must be deployed for the users from the workspacelab.com and vendorlab.com domains. The workspacelab users connecting from the internal (workspacelab) network should be authenticated using LDAP. The workspacelab users connecting from the external network should be authenticated using LDAP and RADIUS. The vendorlab use
A. Create shadow accounts for the users of the Workspacelab domain in the Vendorlab domain
B. Create a global catalog containing the objects of Vendorlab and Workspacelab domains
C. Create shadow accounts for the Vendorlab domain in the Workspacelab domain
D. Create a two-way trust between the Vendorlab and Workspacelab domains
عرض الإجابة
اجابة صحيحة: B
السؤال #6
Scenario: A Citrix Architect needs to assess an existing on-premises NetScaler deployment which includes Advanced Endpoint Analysis scans. During a previous security audit, the team discovered that certain endpoint devices were able to perform unauthorized actions despite NOT meeting pre-established criteria. The issue was isolated to several endpoint analysis (EPA) scan settings. Click the Exhibit button to view the endpoint security requirements and configured EPA policy settings. Which setting is prevent
A. Item 6
B. Item 7
C. Item 1
D. Item 3
E. Item 5
F. Item 2
G. Item 4
عرض الإجابة
اجابة صحيحة: F
السؤال #7
Which encoding type can a Citrix Architect use to encode the StyleBook content, when importing the StyleBook configuration under source attribute?
A. Hex
B. base64
C. URL
D. Unicode
عرض الإجابة
اجابة صحيحة: B
السؤال #8
_________ content type supports sending NITRO commands to NetScaler. (Choose the correct option to complete sentence.)
A. Application/sgml
B. Text/html
C. Application/json
D. Text/enriched
عرض الإجابة
اجابة صحيحة: B
السؤال #9
Which parameter must a Citrix Architect configure to ensure that HDX Proxy Connection terminates upon AAA Session TimeOut?
A. ICA session timeout in VPN parameters
B. Session timeout(mins) in NetScaler gateway Session Profile
C. Session timeout(mins) in VPN Parameters
D. ICA session timeout in netScaler Gateway Session Profile
عرض الإجابة
اجابة صحيحة: D
السؤال #10
A Citrix Architect can execute a configuration job using a DeployMasterConfiguration template on a NetScaler_________deployed_________. (Choose the correct option to complete sentence.)
A. CPX; as part of a high availability pair
B. CPX; as a stand alone device
C. SDX; with less than 6 partitions and dedicated management interface
D. MPX; as part of the cluster but Cluster IP is NOT configured
E. SDX; with no partitions as a stand alone device
عرض الإجابة
اجابة صحيحة: C
السؤال #11
Scenario: A Citrix Architect has deployed Authentication for the SharePoint server through NetScaler. In order to ensure that users are able to edit or upload documents, the architect has configured persistent cookies on the NetScaler profile. Which action should the architect take to ensure that cookies are shared between the browser and non-browser applications?
A. The time zone should be the same on the NetScaler, client, and SharePoint server
B. The SharePoint load-balancing VIP FQDN and the AAA VIP FQDN should be in the trusted site of the client browser
C. The Secure flag must be enabled on the cookie
D. The cookie type should be HttpOnly
عرض الإجابة
اجابة صحيحة: B
السؤال #12
Which four load-balancing methods support NetScaler Virtual Server-Level Slow Start? (Choose four.)
A. URLHash
B. Least response time
C. Least Packets
D. Least Connection
E. Token
F. Least bandwidth
G. SRCIPSRCPORTHash
عرض الإجابة
اجابة صحيحة: BCDF
السؤال #13
Scenario: A Citrix Architect holds a design discussion with a team of Workspacelab members, and they capture the following requirements for the NetScaler design project. A pair of NetScaler MPX appliances will be deployed in the DMZ network and another pair in the internal network. High availability will be accessible between the pair of NetScaler MPX appliances in the DMZ network. Multi-factor authentication must be configured for the NetScaler Gateway virtual server. The NetScaler Gateway virtual server i
A. UserNamefield is set as subjection
B. Password used is incorrect
C. User does NOT exist in database
D. IdapLoginName is set as sAMAccountName
عرض الإجابة
اجابة صحيحة: A
السؤال #14
Scenario: A Citrix Architect needs to deploy SAML integration between NetScaler (Identity Provider) and ShareFile (Service Provider). The design requirements for SAML setup are as follows: NetScaler must be deployed as the Identity Provider (IDP). ShareFile server must be deployed as the SAML Service Provider (SP). The users in domain workspacelab.com must be able to perform Single Sign-on to ShareFile after authenticating at the NetScaler. The User ID must be UserPrincipalName. The User ID and Password mus
A. add authentication samIIdPProfile SAMI-IDP –samISPCertName Cert_1 –samIIdPCertName Cert_2 –assertionConsimerServiceURL “https:// auth
B. add authentication samIIdPProfile SAMI-IDP –samISPCertName Cert_1 –samIIdPCertName Cert_2 –assertionConsimerServiceURL https:// sharefile
C. add authentication samIIdPProfile SAMI-IDP –samISPCertName Cert_1 –samIIdPCertName Cert_2 –assertionConsimerServiceURL https:// sharefile
D. add authentication samIIdPProfile SAMI-IDP –samISPCertName Cert_1 –samIIdPCertName Cert_2 –assertionConsimerServiceURL https:// sharefile
عرض الإجابة
اجابة صحيحة: C
السؤال #15
A Citrix Architect has deployed NetScaler Management and Analytics System (NMAS) to monitor a high availability pair of NetScaler VPX devices. The architect needs to deploy automated configuration backup to meet the following requirements: The configuration backup file must be protected using a password. The configuration backup must be performed each day at 8:00 AM GMT. The configuration backup must also be performed if any changes are made in the ns.conf file. Once the transfer is successful, auto-delete
A. netScalerConfigSave
B. sysTotSaveConfigs
C. netScalerConfigChange
D. sysconfigSave
عرض الإجابة
اجابة صحيحة: A
السؤال #16
Which session parameter does the default authorization setting control when authentication, authorization, and auditing profiles are configured?
A. Determines the default logging level
B. Determines whether the NetScaler appliance will allow or deny access to content for which there is no specific authorization policy
C. Determines the default period after which the user is automatically disconnected and must authenticate again to access the intranet
D. Determines whether the NetScaler appliance will log users onto all web applications automatically after they authenticate or will pass users to the web application logon page to authenticate for each application
E. Controls are amount of time the users can be idle before they are automatically disconnected
عرض الإجابة
اجابة صحيحة: B
السؤال #17
Scenario: A Citrix Architect needs to assess an existing NetScaler gateway deployment. During the assessment, the architect collected key requirements for VPN users, as well as the current session profile settings that are applied to those users. Click the Exhibit button to view the information collected by the architect. Which configuration should the architect change to meet all the stated requirements?
A. Item 5
B. Item 1
C. Item 2
D. Item 3
E. Item 4
عرض الإجابة
اجابة صحيحة: A
السؤال #18
Scenario: A Citrix Architect needs to design a new NetScaler Gateway deployment to provide secure RDP access to backend Windows machines. Click the Exhibit button to view additional requirements collected by the architect during the design discussions. To meet the customer requirements, the architect should deploy the RDP proxy through ______ using a________ solution. (Choose the correct option to complete the sentence.)
A. CVPN: single gateway
B. CVPN, stateless gateway
C. ICAProxy: single gateway
D. ICAProxy; stateless gateway
عرض الإجابة
اجابة صحيحة: C
السؤال #19
Scenario: A Citrix Architect needs to deploy a load balancing for an application server on the NetScaler. The authentication must be performed on the NetScaler. After the authentication, the Single Sign-on with the application servers must be performed using Kerberos impersonation. Which three authentication methods can the Architect utilize to gather the credentials from the user in this scenario? (Choose three.)
A. SAML
B. OTP
C. TACACS
D. WEBAUTH
E. LDAP
عرض الإجابة
اجابة صحيحة: ADE
السؤال #20
What can help a Citrix Architect prepare to discuss time scales and resource requirements?
A. Creating a high-level project plan
B. Meeting with each member of the project team to assign tasks
C. Designing the new environment
D. Setting expectations with the project’s key stakeholders
E. Identifying challenges associated with the project
عرض الإجابة
اجابة صحيحة: A

عرض الإجابات بعد التقديم

يرجى إرسال البريد الإلكتروني الخاص بك والواتس اب للحصول على إجابات الأسئلة.

ملحوظة: يرجى التأكد من صلاحية معرف البريد الإلكتروني وWhatsApp حتى تتمكن من الحصول على نتائج الاختبار الصحيحة.

بريد إلكتروني:
رقم الواتس اب/الهاتف: